A randomized 25 question test from a pool of 761 questions, good luck!
In data transmission, a defined area of geographical coverage is commonly called an area network. Which of the area networks below is the second largest in area covered?
Which of the answers below best describes the effect that an extremely steep angle pitch has on light propagation in a fiber optic cable?
SCADA control systems are similar to other control system, but the components for a SCADA system vary slightly. Which of the components below would be required to effectively alert operators to a communication system failure?
In the protocol specifications of Modbus, there are only four types of registers that can be accessed by the master. Which of the terms below is best described as a analog output memory location?
The remote access server in a SCADA system provides WAN access. Which of the environments below would the remote access server reside?
Of the problems below, which would be best solved by shielding on cables?
Which of the terms below can be best described as commands rarely seen on an average Hart device?
A typical HMI has several subsystems attached to it. Which of the subsystems below would be involved in the manipulation process control inputs?
Redundant capability is critical for any DCS. Which of the availability of redundancy below would have redundant I/O, controllers and networks?
Over the lifetime of a HMI, there will be changes to it's software form the supplier. Which of the terms below would best describe the red number in the picture below?
In Modbus, data is read, and written in various memory ranges. Which of the answers below best represents the data type that a coils would use?
There are many versions of Modbus, one of those is Modbus ASCII. Which of the answers below correctly orders the components of the Modbus ASCII frame?
All the wired network components interact with ISO layers. Which of the answers below reflects the ISO layers that the gateway interacts with?
The design and utilization of a SCADA system requires the approval of several layers of government. Which of the terms below would best be described as the framework for the integration of systems network layers?
Parameter settings program the behavior of the function block. Which of the parameters below can be described as one that receives data from another block?
In the protocol specifications of Modbus, there are only four types of registers that can be accessed by the master. Which of the answers below expresses the register size and permissions of a holding registers?
Every IPv4 address is made up of two distinct components that identifies a specific host and a network segment. Which of the answers below names both of those components?
In the protocol specifications of Modbus, there are only four types of registers that can be accessed by the master. Which of the terms below is best described as a analog input memory location?
There are several data access methods used to transmit data. Which of the answers below can be described as a single controlling device commences communication with the responding devices attached to the same network?
A DCS collects a lot of data during the course of operating. Which of the terms below would best describe the database that contains the value of all the parameters and tags, as well as all the programming and the DCS configuration?
The various DCS networks are vital to any plant or process operating smoothly. Which of the networks below must faster and more reliable than any of the others?
The addition of BCC to the message frame increases the efficiency of detecting errors in transmissions. which one of the error check systems based on a mathematical expression and is available to be used on data frames too large for any other method of error checking?
All the wired network components interact with ISO layers. Which of the answers below reflects the ISO layers that the bridge interacts with?
In IPv4, there are a range of protocols that can be used at any one time. Which of the protocols below would be best suited for sensitive data transmission?
There are several data access methods used to transmit data. Which of the answers below can be described as a method that is suitable for larger networks?